Security

Security | News, how-tos, features, reviews, and videos

Composite image of binary code and biometric fingerprint scanning authorization.

cso siem visibility gap in security apps legacy eyes crack breach privacy

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility.

CSO  >  What is a computer virus?

What is a computer virus? How they spread and 5 signs you've been infected

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

CSO  >  ransomware / security threat

To pay or not pay a hacker’s ransomware demand? It comes down to cyber hygiene

A recent call for city leaders to stop paying ransomware demands underscores the need for municipalities to step up their cyber practices and have a good backup process in place.

login credential - user name, password - administrative controls - access control - single sign-on

Best tools for single sign-on (SSO)

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.

bridging a gap

How organizations are bridging the cyber-risk management gap

To bridge the cyber-risk management gap, organizations plan to get CISOs more involved with the business, focus on data security, hire staff, and provide more security awareness training.

best conferences to attend conference convention audience applause clapping by django getty

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

distributed / decentralized network connections across the globe

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem.

cssg 017 thumb
video

How to set up Microsoft Cloud App Security

This new add-on will let you set up alerts about suspicious sign-on activity for Office 365 and other cloud apps.

teamwork trust hands

Trust isn't new, so why are we acting like it is?

The industry is missing the mark when it comes to understanding – and protecting – this high value asset.

Conceptual blockchain imagery.

What blockchain can and can't do for security

Blockchain expert Rosa Shores agrees: Unless you have a data integrity problem, blockchain won't fix it. Try a distributed ledger instead.

Multiple-exposure image of a businessman ascending a staircase within the profile of man in thought.

How CISOs become business leaders

Security leaders need to master marketing, HR, business lingo and more to really help lead their organizations, says William Hill’s group CISO.

Election secuity / ballot boxes / binary code

Secure elections scorecard: Grading the candidate and Congressional proposals

After 2016's election security debacle, there's a push to secure America's electronic voting infrastructure. Some of the proposals are good. Others fall short. CSO investigates.

Microsoft Cloud App Security

How to set up Microsoft Cloud App Security

Microsoft's Cloud App Security add-on will alert you to suspicious sign-in activity in Office 365, Azure and other cloud apps using standard templates or custom policies.

tandy 102 laptop

‘Stranger Things,’ data provenance, intelligent systems and data conversion

Season 3 of “Stranger Things” takes us back to 1985 in Hawkins, Indiana, and the magic of the Starcourt Mall. An underlying theme of this show is how the side effects of technology research can lead to adverse consequences. This...

succession brain sharing intellectual knowledge sharing

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

internet web browser

Evaluating DNS providers: 4 key considerations

DNS attacks are increasing, Is your Domain Name System implementation up to snuff? Here's what you need to know to make sure you have the provider right for you.

FireMon network security policy management

Must-have features in a modern network security architecture

Form factors and use cases are changing, so network security must be more comprehensive, intelligent, and responsive than ever before.

CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems.

Load More